The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location.
Solution:
The product stores sensitive information in cleartext in memory.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-03 | us government resource third party advisory patch |
https://www.aveva.com/en/support/cyber-security-updates/ | patch vendor advisory |